Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protect
All Posts (2220)
[Posted on Behalf of Rajeev Shukla, Founder and CEO, Castellum Labs]
The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not just the jobs, anymore. Within next decade, "The Enterprises" and "The Jobs", wil
Solve Problems: Be the problem solver. I
[Posted on Behalf of Anton Chuvakin, Security Strategy - chronicle Google]
Let me ask you this: do smaller businesses (say, SMBs) get more security vendor lies than large enterprises? My past analyst experience certainly seems to suggest so. When I
[Posted on Behalf of Pushkal Mishra AVP IT & CISO HDFC ERGO Health Insurance Ltd)
The 2019 edition of Symantec threat report reveals that:
- One in 10 URLs are malicious
- More than 70 million records stolen from poorly configured *S3 buckets
- 56% ris
[Posted on Behalf of Gary Hayslip, CISO Softbank Investment advisor]
Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is maturing so fast, it's harming many of the security professionals who se
Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the l
1. Take all the precaution to keep the Coronavirus away on the
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
"AI Needs to Understand How the World Actually Works"
On Wednesday, February 26th, Clearview AI, a startup that compiles billions
[Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author ]
METT-T is an acronym for planning patrol mission utilized by the US Marine Corps. This acronym is also very useful when applied to planni
[Posted on Behalf of Subbu Iyer, Founder & chief designer architect Hreemm]
An emperor was once gifted two baby peregrine falcons. These species are known for their speed and predatory skills. He summoned the best trainer in his kingdom and handed
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ]
Why did the CapitalOne hacker do what she did?
Following forensic analysis related to the Capital One breach, a spokesperson for t
[Posted on Behalf of Gary Hayslip CISO Softbank Investment advisor]
Over the years in my career, I have heard some variation of this question from many of my peers. Usually, the discussion starts over a cold beverage as we catch up and discuss ho
Lets talk on why we need iSOC in the COVID situation.
Enterprises are moving towards a different working organization due to Covid19 pandemic situation - major part of employees within the organization are bound to work remotely, which is increasing
Leadership requires dealing with ambiguous situations. The ability to adapt to unforeseen crisis events is a crucial skill for cybersecurity and strategy professionals. Nobody saw Covid-19 coming a year ago, yet as it has swept across the globe it
IT Service Management (ITSM) is nothing new to the Information Technology realm. I propose now is the t
[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG) ]
So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a rapid collaps
[Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm]
Every other person is lamenting about world never ever going to be the same again. This of course references the current context of the Covid - 19 wringing its destruction on this p
Watch panelists Chris Roberts, G. Mark Hardy, and Matthew Rosenquist at VShield 2020
I had the honor to be on a distinguished panel with the incredibly knowledgeable G. Mark Hardy and the infamous white-hat hacker Chris Roberts. We discussed the evol
[Posted on Behalf of Anton Chuvakin, Security strategy chronicle , Google]
There is a lot of hilarity in how some organizations move to the cloud. Today, there are many stories of people who “lift and shift” during the migration. As a result, they b
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)